Close Menu
    Facebook X (Twitter) Instagram
    Community Updates
    • Quick Custom Intelligence Marks 6 Years of Transforming the Future of Casino Gaming
    • SkyCity Entertainment Group Expands Strategic Partnership with Quick Custom Intelligence
    • G2E Asia and Asian IR Expo Return This May, Driving Digital Innovation Across Gaming, Entertainment, and Integrated Resorts
    • QCI Introduces New Operational Solutions at IGA 2026
    • QCI Advances Dispatch Capabilities with Modernized, Fully Integrated Platform
    • QCI to Showcase AGI56.1 at IGA 2026, Accelerating Performance Across Tribal Gaming Operations
    • QCI Launches QCI RV, Turning Casino RV Parks into High-Value Revenue Engines
    • QCI to Showcase Agentic Platform Capabilities at IGA 2026
    Gaming & Leisure
    • Archives
      • Gaming & Leisure Magazine Archives
    • Employment Dashboard
    • Research
    • News
      • G & L Community
      • Gaming
      • Hospitality
      • Travel
      • Restaurants
    • Awards
      • Annual Gaming & Hospitality Industry Awards Entry Packet
      • G&L Platinum Award
      • G&L Transformation Award
      • G&L Partner Award
      • G&L Innovation Award
    • G&L Roundtable
      • Overview
      • Exec. Attendee Registration
      • Property Attendee Golf Only
      • Sponsor Information
      • Sponsor Registration
      • NBP Sponsor Registration
      • NBP Special Registration
      • Industry Roundtable Insights
      • Photos
      • G&L’s Health & Safety
    • G&L Forum
      • Executive Registration
      • Sponsor Registration
      • Photos
        • G&L Forum Photos
        • G&L Forum Reception Photos
        • G&L Forum Executive Document
    • About
      • About G&L Business Partners
      • G&L Business Perspectives
      • Contact Us
      • G&L Board
      • G&L Business Partners
      • G&L CEO
      • G&L Editorial Residents
      • G&L Overview Media Kit
      • G&L Privacy Notices
      • Resources
    • G&L Portals
      • Business Partner Portal
        • Submit G&L Social Post
        • Submit G&L Voice Ad
        • Submit Web Banner Ad
        • Submit G&L Magazine Ad
        • Submit For G&L Monthly
        • Submit G&L Business Package
        • Submit Your Positions Available
        • Submit Press Release
        • Submit to Calendar of Events
        • Add/Update Your Logo
        • Payments & Terms
      • Editorial Portal
        • Step 1: Please Confirm You’ll Submit for the Upcoming Edition or the New & Cool Advertorial.
        • Step 2: Submit for the Upcoming Edition
        • New Writer Onboarding
    • Calendar
    • Subscribe
    Gaming & Leisure
    You are at:Home»Technology»Consumer Technology»COMPUTER HACK ATTACKS: HOW SAFE ARE YOU, REALLY?

    COMPUTER HACK ATTACKS: HOW SAFE ARE YOU, REALLY?

    March 17, 2015 Consumer Technology
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    From the theft of intellectual property, personal emails and social security numbers at Sony

    Pictures to the discovery of “Black Energy” malware on critical U.S. infrastructure computers, one

    thing is clear: The computer hacking stakes are getting higher. What’s going on, and what can you

    do to fortify your systems? Inquire within.

    While visions of sugarplums were dancing

    through our heads this past holiday season,

    legions of hackers continued their relentless

    pursuit of chaos to conjure their own version

    of Black Friday. A recent cyber attack against

    Sony Pictures Entertainment exemplifies this

    growing challenge to companies large and

    small – the need to not only back up your

    computer systems securely, but also defend

    against data destruction.

    Cyber-crimes typically take one of three

    forms: 1) gangs stealing information they can

    pawn for money, 2) hacktivists disabling computers

    or shaming companies in retaliation for

    their “sins”, or 3) nation states engaging in

    corporate espionage. But the Sony Pictures

    case has taken corporate cyber attacks to a new

    level of sophistication. And devastation.

    Sony Gets Slammed

    Sony was hit by hacker’s right before

    Thanksgiving, resulting in a company-wide

    computer shutdown, the leaking of unreleased

    films to file sharing sites, and the public posting

    of caches of confidential documents – documents

    containing everything from Sony

    employees’ healthcare files, passwords, and

    social security numbers (including Sylvester

    Stallone’s) to executive salaries and more.

    The attack didn’t end with the pirating of

    new films and sensitive employee data, either.

    Large portions of Sony’s computer data were

    also systematically destroyed, prompting the

    FBI to issue a flash warning to security

    administrators at American corporations

    about recently discovered malware that commands

    a computer to sleep for two hours,

    reboots it, and then directs it to start purging

    all of its files. The hackers also defaced Sony’s

    websites with images of red skeletons, filled

    the company’s Twitter feeds with rants, and

    sent emails to Sony employees that threaten

    their family members.

    Speculation about this breach has centered on

    North Korea in response to Sony’s planned

    release of a movie about a farcical assassination

    attempt on Kim Jong Un. But the fact that

    Windows screensavers across the computer

    network were replaced with images of a red

    skeleton suggest the attack had some help

    inside the network – perhaps by a Sony

    employee or a contractor at Deloitte, which

    was also hacked by the same group around the

    same time.

    Covering Your Assets

    Protecting your computer systems from hack

    attacks requires as much vigilance on your

    end as cyber scumbag’s display on their end.

    Not doing so can be catastrophic: Nearly two

    weeks after the assault on Sony, its internal

    systems were still disabled, with employees

    reportedly using manual punch cards to document

    work time.

    Here are a few things to consider in assessing

    your own cyber security:

    1) Adopt comprehensive backup and disaster

    recovery plans. Don’t think your security

    and backup systems are good enough?

    Congrats, you’ve past the first test in cyber

    security: Good enough never is. Even themost “bulletproof” offsite data storage facilities

    are susceptible to theft. And that might

    be the least of your headaches.

    What if your systems are wiped out like

    Sony’s? Do you have a detailed step-by-step plan

    for getting back in business? How quickly?

    What if the local power grid gets hacked and

    goes down? Do you have a plan for staying in

    business when the lights are off? Unfortunately,

    that’s a very real possibility. Think about every

    scenario and every entry point into your system.

    Defend them like crazy.

    2) Review your cyber security frequently.

    State-of-the-science security measures become

    outdated quickly. The widespread use of

    CAPTCHAs – those swirly mashed-up letters

    you must type to prove you’re not a bot – isn’t

    only a pain; it’s also increasingly useless.

    Google claims that 99 percent of the

    CAPTCHAs in use can now be cracked by

    hacker algorithms. Chances are good that

    your company is using CAPTCHA as a security

    layer somewhere.

    Fortunately, Google now offers a tool that

    replaces CAPTCHA with a simple box the

    user must check in response to a “I am not a

    robot” prompt. This new process is powered

    by sophisticated AI software that determines

    your “humanness” by looking at what you do

    before, during and after clicking on the box.

    3) Trust if you must, but verify. Sure,

    you’ve got a firewall fortress protecting your

    computer systems from black hat outsiders.

    But sometimes, the good guys inside your

    company are a bigger threat. Even if they

    aren’t malicious, employees sometimes

    expose your network to malware unwittingly

    through things like virus-laden “Trojan

    resumes” submitted to HR. The bigger

    your company is, the more you’re going to

    have a lot of talented people hammering

    away at your systems, trying to break them.

    Pay particular attention to vendors who

    have access to your IT systems from outside

    the company. Going back to our Sony example,

    it is believed (at press time) that a

    Deloitte employee working for Sony might

    have unknowingly infected their computers.

    That would be the same Deloitte who’s been

    touting its digital threat intelligence services

    and advising companies aboutBottom line: There’s no such thing as being

    too careful when setting up password/security

    systems and training employees on the

    responsible use of social media (and its security

    vulnerabilities).

    4) Mobile is not your friend. Where’s that

    thumb drive been? Had the Iranians asked

    that question – and scanned thumb drives for

    viruses before plugging them into their computers

    – their nuclear weapon…er, um,

    nuclear energy…program wouldn’t have suffered

    a dramatic setback after the Stuxnet

    virus destroyed a fifth of their centrifuges.

    Laptops, thumb drives, mobile phones, email

    attachments…scan everything before allowing

    any file transfers onto your network.

    5) Take your security personally. If there’s

    one take-away from the post-Sony, post-

    Target, post-White House, post-everyone else

    security breaches, it’s this: You have a responsibility

    to protect yourself, your company,

    your computers and your networks…because

    nobody’s going to do it for you. And even if

    they do, there’s no guarantee you’re totally

    protected, right Deloitte?

    There are some simple things you can do to

    increase your safety. Use good password

    hygiene – don’t use the same password everywhere,

    and don’t use a password anyone can

    hack by reading your Facebook bio. Change

    your passwords frequently (each time you

    adjust your clocks for Daylight Savings Time

    isn’t a bad method). Use a separate credit card

    for all of your online purchases, and monitor

    your bank statements carefully.

    Oh, and don’t keep a folder on your computer

    system labeled “Passwords.” Allegedly, Sony

    Pictures had such a folder, which probably contributed

    to their victimization. Be smart and

    maintain a healthy dose of paranoia regarding

    cyber security. Chances are, you and your company

    are at greater risk than you imagine.

    If that thought scares you, I’m sorry…but

    you’ll thank me later. If that thought doesn’t

    scare you…well, there’s a reason why the

    School of Hard Knocks has such a large class

    of graduates.

    Op/ed column submitted by Ann Nygren,

    President of Key Consulting Software. KCS

    is an IT consulting company focused on

    gaming and hospitality applications

    ranging from Agilysys (LMS/Stratton

    Warren/Infogenesis), Infinium (AM, AR,

    FA, GL, GT, HR, IR, PA, PL, PY, TR),

    Bally (CMS, CMP, ACSC & SDS), and

    interfaces with Aristocrat, IGT and

    Micros to transitioning properties during

    purchase, sales, or merging of properties.

    KCS provides IT Departments with assistance

    in installation & upgrades, customization,

    interfacing and creation of unique

    client-specific software.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    IS DIGITAL ADVERTISING REACHING A TIPPING POINT?

    July 10, 2024

    2016: A CHAT BOT ODYSSEY

    July 10, 2024

    HOW FAR DO FACEBOOK FOOTPRINTS TRAVEL? FARTHER THAN YOU MIGHT THINK.

    July 10, 2024

    Comments are closed.

    G&L VOICE

    Listen and/or watch industry influencers sharing insights in your car, office, home or while traveling. You’re going to love it!

    Sponsored by: Agilysys + ITRG
    David Ting CTO, Bespin Global

    Sponsored by: Agilysys + ITRG

    YouTube Video UExlVmFLSm9vTVFkZDZ5YlR5WFBDNjVnZC1KU1gtTE9sMC4wMTYxQzVBRDI1NEVDQUZE

    David Ting CTO, Bespin Global

    March 24, 2026 12:21 pm

    Agilysys + ITRG
    Adam Lopez, President CMIT Solutions

    Agilysys + ITRG

    YouTube Video UExlVmFLSm9vTVFkZDZ5YlR5WFBDNjVnZC1KU1gtTE9sMC4wNEU1MTI4NkZEMzVBN0JF

    Adam Lopez, President CMIT Solutions

    February 23, 2026 10:15 am

    Sponsored by: Agilysys + ITRG
    Mark Fancourt, Principal Consultant & Co Founder, TRAVHOTECH

    Sponsored by: Agilysys + ITRG

    YouTube Video UExlVmFLSm9vTVFkZDZ5YlR5WFBDNjVnZC1KU1gtTE9sMC5CQkEwRDA0MDkwNUM2MDY1

    Mark Fancourt, Principal Consultant & Co Founder, TRAVHOTECH

    January 22, 2026 3:22 pm

    Sponsored by Agilysys + ITRG
    Benjamin Bohman, Founder & CTO of Stratishield AI

    Sponsored by Agilysys + ITRG

    YouTube Video UExlVmFLSm9vTVFkZDZ5YlR5WFBDNjVnZC1KU1gtTE9sMC5GNjAwN0Y0QTFGOTVDMEMy

    Benjamin Bohman, Founder & CTO of Stratishield AI

    December 29, 2025 12:43 pm

    This episode of G&L Voice is sponsored by: Agilysys and Bepoz
    Fred Brown CTO, Virtual Procurement Services

    This episode of G&L Voice is sponsored by: Agilysys and Bepoz

    YouTube Video UExlVmFLSm9vTVFkZDZ5YlR5WFBDNjVnZC1KU1gtTE9sMC41NTZEOThBNThFOUVGQkVB

    Fred Brown CTO, Virtual Procurement Services

    November 18, 2025 3:54 pm

    View More

    Click here to subscribe to Apple podcast.

    Gaming & Leisure
    Connect with our CEO Jeannie Caruso
    Jeannie Caruso
    Connect with the G&L Community
    • Twitter
    • Facebook
    • LinkedIn
    Copyright © 2026 Gaming & Leisure. Site managed by PixelMongers LLC.

    Type above and press Enter to search. Press Esc to cancel.

    • Sign in
    • New account

    Forgot your password?

    Lost your password? Please enter your email address. You will receive mail with link to set new password.

    Back to login

    This website uses cookies to improve your experience. By continuing to browse this site you are agreeing to our use of cookies and our privacy policy. G&L Privacy Policy
    Privacy & Cookies Policy

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT